WebApp Sec mailing list archives
Re: Any security issue with using SPNEGOto perform single-sign-on?
From: Paul Johnston <paul () westpoint ltd uk>
Date: Wed, 23 Mar 2005 13:07:37 +0000
Hi,In principle I would worry that there's a risk of phishing style attacks where users are lured to visit a fake site, which harvests their details. Now, I think this is mitigated, because credentials are only given to sites in the intranet zone, and the server name is included in the kerberos principal. But still, this is an attack angle I'd give some thought. For example, can an attacker who has harvested a single ticket then perform an offline password brute force attack?
I agree, CSRF is a problem with any authentication scheme where the browser automatically attached the credentials. For now you'll have to rely on the application-layer workaround of having random tokens in forms. I've just been musing that browsers could provide this protection with a simple rule: for POST requests, where the originating form is a different (hostname, protocol) to the target, do not attach any credentials. Provided people followed the HTTP spec (i.e. only do actions on POST requests), this would provide decent protection and I don't think it would break much.
A general worry I have is SSO is that there is no longer a logout function. It's considered good practice to provide a logout function, so a user can be reasonably sure their session really has finished and no further actions can occur. I guess the browser could do this - it would prompt the first time it sends credentials to a site, after that automatically send credentials without asking, until the user selects some kind of logout function. I don't think any browsers support this, but it could work.
Regards, Paul Saqib Ali wrote:
I was wondering if anyone has encountered any security concern/issues while implementing SPNEGO < http://www.vintela.com/resources/topics/spnego/ >. SPNEGO provides a single-sign-on in a KERBEROS enabled environment. Basically it allows web applications to automatically authenticate clients who have valid Kerberos credentials. I am planning to install the mod_spnego module on a apache server, that will enable the client to single-sign-on to our internal application, if they are part of our AD. I possible concern is the increase of CSRF type of attacks, but that is the case with any single-sign-on solution.
-- Paul Johnston, GSEC Internet Security Specialist Westpoint Limited Albion Wharf, 19 Albion Street, Manchester, M1 5LN England Tel: +44 (0)161 237 1028 Fax: +44 (0)161 237 1031 email: paul () westpoint ltd uk web: www.westpoint.ltd.uk
Current thread:
- Any security issue with using SPNEGOto perform single-sign-on? Saqib Ali (Mar 20)
- Re: Any security issue with using SPNEGOto perform single-sign-on? Paul Johnston (Mar 23)